www.kuppingercole.com Open in urlscan Pro
2606:4700:3108::ac42:2b51  Public Scan

Submitted URL: https://email.iam-excellence.com/e3t/Ctc/2K+113/cCP9x04/MWRsF5BVTVbW38Zgcy4hM0vCW9fbdmV56pM5XN7FnD0b5nR32W50kH_H6lZ3lrW7fXlG42rBr...
Effective URL: https://www.kuppingercole.com/events/2023/12/mastering-global-iam?utm_campaign=IAM%20Insights%20%E2%80%93%20Marketing%20Newsle...
Submission: On November 29 via api from ES — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

Go to Market with KuppingerCole


Insights
Research
Advisory
Events
KC Open Select
Company
Become a Client

Login

Search

Become a Client

Insights


Customer Identity & Access Management Decentralized Identity Fraud Prevention
Identity & Access Management Identity Governance and Administration Passwordless
Authentication Privileged Access Management Zero Trust
Research


Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog
Videos
Advisory


Advisory Services Meet our Advisors
Events


EIC 2024 cyberevolution Webinars
KC Open Select


Managed Detection and Response Data Leakage Prevention Unified Endpoint
Management Fraud Reduction Intelligence Platforms Identity Governance &
Administration Customer Identity and Access Management Privileged Access
Management Passwordless Authentication
Company


About us People Jobs Newsroom Cybersecurity Council Contact us

Go to Market with KuppingerCole
Insights
Customer Identity & Access Management
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
See all insights

Most recent in Customer Identity & Access Management
Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them
directly. View solution detailed ratings, demo videos, analyst interviews and
contact vendors directly.
Executive View
ForgeRock Workforce Identity Governance
This KuppingerCole Executive View report looks at the ForgeRock Workforce
Identity Governance solution, which combines enterprise identity governance with
access management to manage the complete identity lifecycle within a single
platform.
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and
Ping Identity by Thoma Bravo triggered discussions and rumors about the impact
on the broader Identity & Access Management (IAM) market. Recently, Thoma Bravo
announced that ForgeRock would be combined into Ping
Most recent in Decentralized Identity
Event Recording
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will
look at the concepts behind Decentralized ID and its current state. Based on
that introduction, he will share his perspectives on how Decentralized IDs can
improve the cybersecurity posture of organizations for
Advisory Note
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed
and Sovereign Identities in Our Private Metaverse
Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working
beta version of photorealistic—or rather, video realistic—avatars in the
metaverse. Zuckerberg also claims that this technology will begin rolling out
this year (2023) and will be at a consumer price point by the end of
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or
less? Anyway: We live in the Digital Age. The vast majority of organizations
rely on digital services to run at least parts of their business. Every one of
us is consuming such digital services. They are ubiquitous. But
Most recent in Fraud Prevention
Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in
response to increased fraud risk levels globally.
Blog
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
The enforcement of NIS2 is marked by firm oversight and significant sanctioning
power. Supervisory bodies are designated at the national level to monitor and
enforce compliance.
Webinar Recording
Are You Prepared for the True AD Disaster?
In this webinar, we will look at Disaster Recovery planned right and done right
– preparation is key to success The central role of directory services for the
entire IT Events triggering the need for directory services DR Planning for
directory services / Microsoft AD DR: How
Most recent in Identity & Access Management
Event Recording
The Next Generation of Secure Access with Zero Trust
Learn how Netskope can deliver a seamless transition for implementing the next
generation of Zero Trust protection with their award-winning SSE platform.
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and
Ping Identity by Thoma Bravo triggered discussions and rumors about the impact
on the broader Identity & Access Management (IAM) market. Recently, Thoma Bravo
announced that ForgeRock would be combined into Ping
Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery
Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage
of experts, budget constraints, and difficulties in keeping up with industry
changes. Fluctuations in IAM engagement lead to stress and reduced productivity.
Insufficient transparency and prioritization cause financial
Most recent in Identity Governance and Administration
Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated
Identity Lifecycle Management and Access Governance markets.
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and
Ping Identity by Thoma Bravo triggered discussions and rumors about the impact
on the broader Identity & Access Management (IAM) market. Recently, Thoma Bravo
announced that ForgeRock would be combined into Ping
Video
Why You Shouldn’t Just Use IGA for Third Party Access Management
Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at
KuppingerCole Analysts to explore the realm of Third Party Access Governance and
its key distinctions from Identity Governance and Administration (IGA). Discover
the evolving landscape of corporate Access Governance,
Most recent in Passwordless Authentication
Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication
needs and compare them directly. View solution detailed ratings, demo videos,
analyst interviews and contact vendors directly.
Event Recording
Is the future really password-free and is it worth using a PAM solution?
Comprehensive protection of networks, system infrastructures, hardware and
software, applications and data is part of every cyber security strategy. But
what does this actually mean for identity and access management? Unloved for
many years and repeatedly declared dead: passwords. Large IT
Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive
Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern
Identity and Access Management (IAM) platform. As the cybersecurity threat
landscape continues to evolve, so do the requirements for IAM. Managing
identities and access is essential to ensure that only the right people
Most recent in Privileged Access Management
Open Select
Privileged Access Management
Create a shortlist of solutions tailored to privileged access management your
needs and compare them directly. View solution detailed ratings, demo videos,
analyst interviews and contact vendors directly.
Event Recording
Is the future really password-free and is it worth using a PAM solution?
Comprehensive protection of networks, system infrastructures, hardware and
software, applications and data is part of every cyber security strategy. But
what does this actually mean for identity and access management? Unloved for
many years and repeatedly declared dead: passwords. Large IT
Executive View
NRI Secure Uni-ID Libra 2.7
Consumer Identity and Access Management (CIAM) continues to be a growing market
year over year, offering a better user experience for the consumer and new
challenges for the organization. With a focus on the Japanese market, the
updated NRI Secure’s Uni-ID Libra v2.7 continues to provide innovative
Most recent in Zero Trust
Event Recording
Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains
Paul Fisher delves into the multifaceted approach required to foster
trustworthiness within complex software supply chains. This discussion begins by
delineating the critical components of software supply chains and the potential
risks associated with each link—from development and
Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive
Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern
Identity and Access Management (IAM) platform. As the cybersecurity threat
landscape continues to evolve, so do the requirements for IAM. Managing
identities and access is essential to ensure that only the right people
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or
less? Anyway: We live in the Digital Age. The vast majority of organizations
rely on digital services to run at least parts of their business. Every one of
us is consuming such digital services. They are ubiquitous. But
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Videos
See all research

Most recent in Leadership Compass
Nov 08, 2023
Cloud Infrastructure Entitlement Management (CIEM)
This Leadership Compass provides an overview and insights into the Cloud
Infrastructure Entitlement Management (CIEM) market, with the aim of helping
your organization find the right products and technologies for a successful CIEM
deployment.
Oct 23, 2023
API Security & Management
This Leadership Compass provides an overview of the market for API security and
management solutions, along with recommendations and guidance for finding the
products which address your requirements most efficiently. We examine the
complexity and breadth of the challenges to discover, monitor, and
Sep 18, 2023
Attack Surface Management
This report provides an overview of the Attack Surface Management market and
provides you with a compass to help you to find the solution that best meets
your needs. We examine the market segment, vendor service functionality,
relative market share, and innovative approaches to providing Attack
Most recent in Whitepaper
Nov 13, 2023
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive
Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern
Identity and Access Management (IAM) platform. As the cybersecurity threat
landscape continues to evolve, so do the requirements for IAM. Managing
identities and access is essential to ensure that only the right people
Aug 31, 2023
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery
Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage
of experts, budget constraints, and difficulties in keeping up with industry
changes. Fluctuations in IAM engagement lead to stress and reduced productivity.
Insufficient transparency and prioritization cause financial
Jul 19, 2023
Speeding up Zero Trust Delivery using Managed Services
Zero Trust is important as a fundamental and essential paradigm for a stronger
cybersecurity posture. Zero Trust, on the other hand, is complex to put in
practice. For succeeding with the Zero Trust journey, leadership and an
organization that is working hand in hand are essential, but also the
Most recent in Executive View
Oct 25, 2023
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den
Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den
Sicherheitsverantwortlichen für Managed Security Services in Form von MDR
(Managed Detection and Response) zur Verfügung stehen. Der Report enthält eine
Oct 16, 2023
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of
deployment scenarios without the technical debt of existing competing solutions.
It offers several unique capabilities such as sophisticated device inventory and
posture checks, agentless and embeddable connectivity,
Oct 10, 2023
ForgeRock Workforce Identity Governance
This KuppingerCole Executive View report looks at the ForgeRock Workforce
Identity Governance solution, which combines enterprise identity governance with
access management to manage the complete identity lifecycle within a single
platform.
Most recent in Advisory Note
Oct 30, 2023
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed
and Sovereign Identities in Our Private Metaverse
Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working
beta version of photorealistic—or rather, video realistic—avatars in the
metaverse. Zuckerberg also claims that this technology will begin rolling out
this year (2023) and will be at a consumer price point by the end of
Sep 22, 2023
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center
(SOC) as it is becoming more critical for strengthening their cybersecurity
defenses against sophisticated cyber threats. A modern SOC enables proactive
threat detection, rapid incident response, and cyber resilience by
Sep 04, 2023
EU Digital Operational Resilience Act (DORA)
Operational resilience is essential for every organization embracing digital
transformation to ensure that all business IT systems are able to resist and
recover from any type of disruption, including cyberattacks. The European Union
has put together a framework of requirements in the Digital
Most recent in Leadership Brief
Nov 04, 2022
Why Vulnerability Management Is a Strategic Investment
Considering that the threat landscape is constantly changing, it is important to
maintain a strong cybersecurity foundation. Organizations need security hygiene
standards to increase security and readiness while preventing vulnerabilities
from being exploited by adversaries. By introducing a
Aug 30, 2022
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one
of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of
the most popular initial cyber-attack vectors, which is all too often
overlooked. This leadership brief details the security risks
Aug 09, 2022
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced
Persistent Threat (APT) actors and cybercriminals as digital transformation
accelerates. Many hitherto isolated systems now connected, which introduces
additional risks from enterprise IT and the cloud. Although such
Most recent in Blog
Nov 28, 2023
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
The enforcement of NIS2 is marked by firm oversight and significant sanctioning
power. Supervisory bodies are designated at the national level to monitor and
enforce compliance.
Nov 08, 2023
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever
international conference on the safety and regulation of artificial
intelligence. With attendees from over 30 governments and international
organizations, it represented the beginning of long-term international
cooperation on
Nov 07, 2023
Foresight Consulting in Cybersecurity
Cybersecurity professionals sometimes must predict the future to be able to know
what to do in the present. With SAFIRE scenarios they can get a real edge over
cyber criminals.
Most recent in Videos
Nov 27, 2023
Analyst Chat #196: AIdentity - The Crucial Link Between AI and Identity
In this episode, Matthias and Martin explore the evolving role of AIs in
business processes. AIs are becoming significant actors, representing human
identities in tools like chatbots and even functioning autonomously. Martin
underscores the importance of traceability, access management, and the
Nov 24, 2023
Are You Prepared for the True AD Disaster?
In this webinar, we will look at Disaster Recovery planned right and done right
– preparation is key to success The central role of directory services for the
entire IT Events triggering the need for directory services DR Planning for
directory services / Microsoft AD DR: How
Nov 17, 2023
cyberevolution Wrap-Up

Events
EIC 2024
cyberevolution
Webinars
See past events

European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get
the Prime Discount and register for 1,000 EUR!
To the Event Call for Speakers

cyberevolution
Attend cyberevolution in Germany and meet 500 security experts from Nov 14 - 16,
2023. Participate in interactive sessions to explore cybersecurity in an AI
powered digital world. Network with an international community and learn about
societal, technological, and environmental megatrends.
To the Event Agenda Overview

Most recent in Webinars
Nov 29, 2023
The Anatomy of Insider Threats: Understanding the Risks in Financial
Institutions
In the high-stakes world of financial institutions, safeguarding sensitive data
is paramount. The enemy, however, may lurk within. Join us for an eye-opening
webinar as we delve deep into the world of insider threats, their definitions,
types, and most importantly, how to protect your institution
Nov 30, 2023
Supercharge Your Access Control Capabilities With a New Approach
Are you ready to revolutionize your understanding of Access Control? We invite
you to a game-changing webinar that will illuminate the vital distinctions
between policy-based, attribute-based, and role-based access control – the three
pillars of modern access control. Prepare to embark on a journey
Dec 05, 2023
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control
challenges, the limitations of traditional RBAC and PBAC, some innovative
policy-driven solutions, a demonstration of policy-driven RBAC in MidPoint, and
actionable insights for enhancing access control strategies.
Advisory
Advisory Services

KuppingerCole's Advisory stands out due to our regular communication with
vendors and key clients, providing us with in-depth insight into the issues and
knowledge required to address real-world challenges.

See Advisory Services

Contact our advisors



E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0



Meet our Advisors

KC Open Select
Managed Detection and Response
Data Leakage Prevention
Unified Endpoint Management
Fraud Reduction Intelligence Platforms
Identity Governance & Administration
Customer Identity and Access Management
Privileged Access Management
Passwordless Authentication
Discover and compare cybersecurity solutions

Compare solution offerings and follow predefined best practices or adapt them to
the individual requirements of your company.

Visit KC Open Select

Contact KuppingerCole



E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0



Contact Us

Company
About us People Jobs Newsroom Cybersecurity Council Contact us
Discover Our Passion for Advancing Identity and Security
We are specialized in the strategic management of digital identities,
privileges, authentication, and access control as well as cybersecurity and
business resilience.
Read more about our philosophy

Analysts & Advisors

Meet our team of analysts and advisors who are highly skilled and experienced
professionals dedicated to helping you make informed decisions and achieve your
goals.

Business Team

Meet our business team committed to helping you achieve success. We understand
that running a business can be challenging, but with the right team in your
corner, anything is possible.

Meet the Team

Career Opportunities

Events
 Wiesbaden
Auszubildende/r zum Veranstaltungskaufmann/-frau (m/w/d)
Die KuppingerCole Analysts AG ist ein IT-Analystenunternehmen mit Hauptsitz in
Wiesbaden und weiteren Standorten rund um die Welt. Insgesamt beschäftigen wir
aktuell rund 50 Mitarbeiter. KuppingerCole unterstützt seine Kunden mit
Leistungen in den Bereichen Events, Advisory und Research.
View all Job Offers

Latest Press Releases
Press Release
November 23, 2023
KuppingerCole Analysts’ cyberevolution 2023 Conference Connects over 700
International Cybersecurity Experts in Frankfurt
The cyberevolution 2023 conference, hosted by KuppingerCole Analysts at the
Frankfurt Kap Europa from November 14 to 16, has successfully concluded, marking
a new era in the exchange of cybersecurity knowledge and practices.
Press Release
August 08, 2023
Mike Neuenschwander Joins KuppingerCole Analysts, Inc. as Vice President
KuppingerCole Analysts AG, a leading global analyst firm providing expertise in
Identity & Access Management (IAM) and Cybersecurity, is delighted to announce
the appointment of Mike Neuenschwander as Global Head of Research Strategy and
Vice President of the company’s US business arm.
Press Release
August 02, 2023
KuppingerCole Analysts AG Achieves TISAX Assurance Level 3 and ISO 27001
Certifications
KuppingerCole Analysts AG, a leading IT analyst company, is delighted to
announce that it has achieved two critical milestones in the field of
information security: TISAX Assessment Level 3 (AL3) and ISO 27001
certifications.
Cybersecurity Council
With the Cybersecurity Council, we bring together world-class information
security professionals in leading positions from across many industries and
schools of thought to exchange and discuss how to secure the rapidly growing
cyber economy. The results of these fruitful discussions will flow into every of
our services.
Learn more

Basic contact information
KuppingerCole Analysts AG
Wilhelmstr. 20-22
65185 Wiesbaden
Germany
E-mail Phone info@kuppingercole.com
+49 (211) 2370 77-0

See all locations, phone numbers, e-mail addresses




Webinars

Upcoming
Webinar
Share

Twitter Facebook LinkedIn Copy URL
Save


BOOKMARKS

Save your favorite items in your personal watch list so that you can read them
later and find them again easily.

Login
Don't have a KC account yet? Join Now


MASTERING GLOBAL IAM FOR CYBERSECURITY EXCELLENCE: FROM ZERO TRUST PRINCIPLES TO
IDENTITY THREAT DETECTION & RESPONSE (ITDR)

December 07, 2023
4:00pm CET, 10:00am EST, 7:00am PST
Register now

Join this webinar to learn about
 * Complex Digital Transformations: As organizations transition to digital
   platforms and embrace cloud technologies, the webinar will provide insights
   into how to navigate the complexities of identity management for a safer and
   more efficient digital transformation.
 * Missing Holistic Security Concept: Learn how to seamlessly integrate SaaS
   services into your security landscape while safeguarding critical assets in
   the cloud.
 * Integration of Legacy Systems: Understand the challenges posed by legacy
   systems and discover strategies for their seamless integration with modern
   IAM solutions, eliminating potential security vulnerabilities.
 *  Decentralized Work Environments: With the rise of remote work, we'll discuss
   strategies for ensuring secure access to company resources from diverse
   locations and devices, enabling you to adapt to the changing work environment
   securely.
 * Zero Trust Implementation: While the Zero Trust model is widely advocated, it
   can be intricate to implement. We will provide insights into the fundamental
   shifts required in organizational security strategies to successfully
   implement the Zero Trust approach.

Why Is IAM So Essential for Strengthening Detection and Response to
Cyber-Attacks?

In today's interconnected global landscape, the role of Identity and Access
Management (IAM) has never been more crucial in shaping cybersecurity
strategies. As businesses expand across borders, the demand for robust
authentication and authorization mechanisms is at an all-time high. Join us in
this insightful webinar as we delve into the world of global IAM, exploring key
concepts, challenges, and solutions that will empower you to take your
cybersecurity to the next level.

Speaker's Contributions

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the
requirements and market for ITDR and the role it plays in the Zero Trust
context, but also its relationship to other DR technologies.

Andre Priebe, Chief Technology Officer at iC Consult, will share his knowledge
and experiences to help you enhance your cybersecurity strategy, tackle global
challenges, and stay ahead in the ever-evolving world of cybersecurity.

Webinar
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to
Identity Threat Detection & Response (ITDR)
Register now
Speakers
Lead Analyst
KuppingerCole
Paul Fisher
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and
identity and access management (IAM). He also studies trends in AI, IoT and data
governance for different industry sectors including automotive. Paul is
responsible for managing relevant quantitative research at...
View profile
Chief Technology Officer
iC Consult Group GmbH
Andre Priebe
Andre Priebe is Chief Technology Officer of the iC Consult Group, a
vendor-independent system integrator specialized in Identity & Access Management
with more than 500 employees around the globe. With over 15 years of experience
in managing IAM projects focussing on workforce, customer, and...
View profile
Lead Sponsor
FAQ

Why should I register for a KuppingerCole webinar?
Join this combined presentation to gain quick insights and hands-on solutions
from a KuppingerCole analyst and selected industry expert, finishing with by a
comprehensive Q&A for your individual business challenges.

How can I register for this webinar?
To register for the webinar, you need to log in to your KuppingerCole account
first. If you do not have an account yet, you can sign up here. After logging
in, please enter your requested personal data which is necessary for the further
administration of your registration. Once registered, a booking confirmation
will be sent to your indicated e-mail address.

How long does the webinar last?
Our webinars last approximately 50-60 minutes.

I did not receive a booking confirmation. What can I do?
If you didn’t receive the booking confirmation in your inbox, please check your
spam folder. If you cannot find the booking confirmation in your spam folder,
please contact us. We will get back to you within one business day.

What technical equipment do I need?
To participate, you need a computer or a laptop with Internet access. If you
want to use the sound transmission via the computer, you will need headphones
(headset) or speakers. You do not need a webcam or microphone. You can type in
questions in the chat window. In the registration confirmation you will also
receive a link that allows you to test the technical requirements in advance.

What does it cost to attend?
Our webinars are generally free of charge.

When will the recordings and presentation slides be available? Will I get
notified? How can I access them?
The recordings and presentation slides will be available on the website shortly
after the webinar. An e-mail will be sent to all registered users. In order to
access the materials, you will need to log in first.

I registered for the webinar, but unfortunately I was not able to attend live.
Do I still get access to the recordings and presentation slides?
Yes, the recordings and presentation slides are made available to all users that
registered for the webinar, regardless if they attended live or were tied up
with business.
See also
Webinars

Hybrid Events

Virtual Events

Insights
Customer Identity & Access Management
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Videos
Advisory
Advisory Services
Meet our Advisors
Events
EIC 2024
cyberevolution
Webinars
KC Open Select
Managed Detection and Response
Data Leakage Prevention
Unified Endpoint Management
Fraud Reduction Intelligence Platforms
Identity Governance & Administration
Customer Identity and Access Management
Privileged Access Management
Passwordless Authentication
Company
About us
People
Jobs
Newsroom
Cybersecurity Council
Contact us
Insights

Customer Identity & Access Management
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
Research

Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Videos
Advisory

Advisory Services
Meet our Advisors
Events

EIC 2024
cyberevolution
Webinars
KC Open Select

Managed Detection and Response
Data Leakage Prevention
Unified Endpoint Management
Fraud Reduction Intelligence Platforms
Identity Governance & Administration
Customer Identity and Access Management
Privileged Access Management
Passwordless Authentication
Company

About us
People
Jobs
Newsroom
Cybersecurity Council
Contact us
Switch to dark theme
Switch to light theme

Imprint Terms & Conditions Terms of Use Privacy Policy © Copyright KuppingerCole
Analysts AG
© Copyright KuppingerCole Analysts AG
Go to Market with KuppingerCole





WE VALUE YOUR PRIVACY

This website uses cookies to personalize content, to provide social media
features, and to analyze traffic. You have the right to consent to essential
services only and to modify or revoke your consent at a later time in the
privacy policy.Privacy Policy

Cookie Settings Reject All Cookies Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices